Teleport 认证绕过漏洞

漏洞信息

漏洞名称: Teleport 认证绕过漏洞

漏洞编号:

  • CVE: CVE-2025-49825

漏洞类型: 权限绕过

漏洞等级: 严重

漏洞描述: Teleport是一款开源的访问管理解决方案,广泛用于企业级服务中,提供SSH、Kubernetes、数据库和其他资源的统一访问入口。它支持多因素认证、访问控制和会话记录等功能,适用于需要高安全性的环境。此漏洞影响Teleport 17.5.2之前的版本,属于认证绕过漏洞。攻击者可以利用此漏洞绕过认证机制,未经授权访问受保护的资源。漏洞的技术根源在于认证流程中的缺陷,使得攻击者能够构造特定的请求绕过安全检查。此漏洞的CVSS评分为9.8,属于严重级别,攻击者无需用户交互即可远程利用,可能导致敏感信息泄露、系统被控制等严重后果。

产品厂商: gravitational

产品名称: Teleport

影响版本: version < 17.5.2

搜索语法: http.favicon.hash:544208100, http.favicon.hash:1854879765, http.favicon.hash:-1275955539, Set-Cookie: __Host-grv_csrf, icon_hash=”544208100”, icon_hash=”1854879765”, icon_hash=”-1275955539”

来源: https://github.com/projectdiscovery/nuclei-templates/blob/61cbd52548fde4e7c307939657da7588b459e25f/http%2Fcves%2F2025%2FCVE-2025-49825.yaml

类型: projectdiscovery/nuclei-templates:github issues

POC详情

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55

id: CVE-2025-49825

info:
name: Teleport - Authentication Bypass
author: pdteam
severity: critical
description: |
Teleport versions prior to 17.5.2 are vulnerable to a remote authentication bypass vulnerability. This issue allows attackers to gain unauthorized access to affected systems.
classification:
cve-id: CVE-2025-49825
cvss-metrics: 3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
reference:
- https://github.com/gravitational/teleport/security/advisories/GHSA-8cqv-pj7f-pwpc
metadata:
verified: true
max-request: 1
shodan-query:
- http.favicon.hash:544208100
- http.favicon.hash:1854879765
- http.favicon.hash:-1275955539
- "Set-Cookie: __Host-grv_csrf"
fofa-query:
- icon_hash="544208100"
- icon_hash="1854879765"
- icon_hash="-1275955539"
- "Set-Cookie: __Host-grv_csrf"
tags: cve,cve2025,teleport

http:
- method: GET
path:
- "{{BaseURL}}/webapi/ping"

extractors:
- type: json
name: version
json:
- .server_version
internal: true

- type: json
json:
- '"Teleport Version: "+ .server_version'

matchers:
- type: dsl
name: version_check
dsl:
- compare_versions(version, '< 17.5.2')
- contains_all(body, "server_version", "teleport")
- '!contains_any(version, "16.5.12", "15.5.3", "14.4.1", "13.4.27", "12.4.35")'
condition: and